Purse Shopper - Hide My Text

Description

Now - "Epic Messaging" - emessage with other HMT users without using SMS
KitKat compatible - with Super Duper Messaging Manager New BETA Feature: Super Duper does *not* have to be the Default SMS App!
*Hide text messages/SMS messages for 5 ...Read more

Description

Now - "Epic Messaging" - emessage with other HMT users without using SMS

*Hide text messages/SMS messages for 5 contacts*Hide call logs for 5 contacts*Block text messages/SMS and Block calls *Decoy Icon, with 2 other Purse decoy icon choices*Change Status bar icon and descriptions*Requires a password to get into the app for privacy*You MUST read directions at download!!!!*Export messages to secured location*Choose your own text message thread colors*Has a Purse icon, Purse screens and status bar notification*See failed attempts to get into app in the “Log File”*Change contacts/password/home screen shortcut anytime*Looks like a Purse Shopping app that has a “Subscription Error”*For “Unlimited” contacts see our “Full Version”*Experience Rednote - add music and emotion to your text messages

Purse Shopper hides text messages. A better way to keep your text messages and your call logs private. Or block text messages and calls from someone. Secure your text messages from anyone and everyone with a password protected decoy app. Or maybe you are into shopping and just want a text messaging app with a cool theme!

Hide texts messages for 5 contacts safely with a password protected decoy “Purse Shopping” app. Once you download this app it will place a “Purse” icon in your app drawer. The app appears to have errors to anyone else that looks at it. Text from selected contacts will be in this app only and will not be put in your “regular” text messages. Text messages in our app are completely separate and secure. When text messages are received, you get a notification in the status bar that says, “Subscription notice,” which goes with the Purse Shopping theme of the app having a “subscription error.” Only you will know it’s a notification for a text message.

You can switch contacts when needed. Don’t worry - once a contact is removed it will not put prior hidden text messages in your “regular” text messaging box. Does not transfer existing text messages – the two areas are completely separate! Does not support MMS…

The hide call log feature allows you to add the contact and all incoming, outgoing and missed calls will be deleted from your regular call logs. You must place the outgoing call from inside the app and you have the choice of saving your call logs inside the app!!!

The Block text messaging feature will allow you to block incoming text messages. You can save blocked text messages that you can read after you unblock the contact. Or we can delete them when they come in. You can still send text messages to the contact while they are blocked. We have added the “Call Blocker” feature for that contact that is really a pain. We also give you the choice to save the call log for these blocked calls or we can discard them as they come in for you.

It does not remove or change your “regular” text message icon in the app drawer. This is not a “Purse Shopping” application! It is a decoy purse shopping application that allows you to hide or block text messages with password protection.

Aggregated device data, including location, is measured for the purposes of market research by Placed, Inc.

Features:*Hide SMS messages from 5 contacts*Hide incoming/outgoing phone call logs for 5 contacts*Choose your own SMS color theme*Three icon options to put on your home screen *Change Status bar notifications and descriptions*Block unwanted text messages from a contact*Block Calls from a contact*Looks like a purse shopping app that requires a subscription password*Logs failed attempts to get into the app, just in case you were wondering*Displays in your “Applications” list as “Purse Shopper”*Experience Rednote - add music and emotion to your text messages

App Questions

Do you have a question about this app?

Top Apps

App Details

UPDATED ON: Mar 8, 2015

SIZE 13,631,488

INSTALLATIONS: 50,000 - 100,000

LATEST VERSION: 2.5.10

REQUIRED ANDROID VERSION: 2.3 and up

Permissions

YOUR ACCOUNTS

discover known accounts

Allows an application to get the list of accounts known by the phone.

YOUR PERSONAL INFORMATION

read contact data

Allows an application to read all of the contact (address) data stored on your phone. Malicious applications can use this to send your data to other people.

write contact data

Allows an application to modify the contact (address) data stored on your phone. Malicious applications can use this to erase or modify your contact data.

PHONE CALLS

read phone state and identity

Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to, ect.

intercept outgoing calls

Allows application to process outgoing calls and change the number to be dialed. Malicious applications may monitor, redirect, or prevent outgoing calls.

modify phone state

Allows the application to control the phone features of the device. An application with this permission can switch networks, turn the phone radio on and off and the like without ever notifying you.

PAID SERVICES.

directly call phone numbers

Allows the application to call phone numbers without your intervention. Malicious applications may cause unexpected calls on your phone bill. Note that this does not allow the application to call emergency numbers.

Allows application to receive and process SMS messages. Malicious applications may monitor your messages or delete them without showing them to you.

NETWORK COMMUNICATION

full Internet access

Allows an application to create network sockets.

view network state

Allows an application to view the state of all networks.

view Wi-Fi state

Allows an application to view the information about the state of Wi-Fi.

YOUR LOCATION

fine (GPS) location

Access fine location sources such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are, and may consume additional battery power.

coarse (network-based) location

Access coarse location sources such as the cellular network database to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.

SYSTEM TOOLS

automatically start at boot

Allows an application to have itself started as soon as the system has finished booting. This can make it take longer to start the phone and allow the application to slow down overall performance of the phone by constantly running.